An information disclosure vulnerability exists in open-webui version 0.3.8. The vulnerability is related to the embedding model update feature under admin settings. When a user updates the model path, the system checks if the file exists and provides different error messages based on the existence and configuration of the file. This behavior allows an attacker to enumerate file names and traverse directories by observing the error messages, leading to potential exposure of sensitive information.
References
Link | Resource |
---|---|
https://huntr.com/bounties/f42cf72a-8015-44a6-81a9-c6332ef05afc | Exploit Issue Tracking Third Party Advisory |
Configurations
History
03 Nov 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
CWE |
15 Oct 2024, 19:04
Type | Values Removed | Values Added |
---|---|---|
First Time |
Openwebui
Openwebui open Webui |
|
References | () https://huntr.com/bounties/f42cf72a-8015-44a6-81a9-c6332ef05afc - Exploit, Issue Tracking, Third Party Advisory | |
CPE | cpe:2.3:a:openwebui:open_webui:-:*:*:*:*:*:*:* | |
CWE | CWE-209 |
10 Oct 2024, 12:51
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
09 Oct 2024, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-10-09 19:15
Updated : 2024-11-03 17:15
NVD link : CVE-2024-7038
Mitre link : CVE-2024-7038
CVE.ORG link : CVE-2024-7038
JSON object : View
Products Affected
openwebui
- open_webui
CWE
CWE-209
Generation of Error Message Containing Sensitive Information